Custom JPEG Quantization for Improved Iris Recognition Accuracy
|
|
- Evelyn Victor Perry
- 5 years ago
- Views:
Transcription
1 Custom JPEG Quantization for Improved Iris Recognition Accuracy Gerald Stefan Kostmajer 1,HerbertStögner 1, and Andreas Uhl 2 1 School of Communication Engineering for IT, Carinthia Tech Institute, Austria 2 Department of Computer Sciences, University of Salzburg, Austria uhl@cosy.sbg.ac.at Abstract. Custom JPEG quantization matrices are proposed to be used in the context of compression within iris recognition. Superior matching results in terms of average Hamming distance and improved ROC is found as compared to the use of the default quantization table especially for low FAR. This leads to improved user convenience in case high security is required. 1 Introduction With the increasing usage of biometric systems the question arises naturally how to store and handle the acquired sensor data. In this context, the compression of these data may become imperative under certain circumstances due to the large amounts of data involved. Among other possibilities (e.g. like template storage on IC cards), compression technology may be used in two stages of the processing chain in classical biometric recognition: 1. Transmission of sample data after sensor data acquisition: In distributed biometric systems, the data acquisition stage is often dislocated from the feature extraction and matching stage (this is true for the enrollment phase as well as for authentication). In such environments the sensor data have to be transferred via a network link to the respective location, often over wireless channels with low bandwidth and high latency. Therefore, a minimization of the amount of data to be transferred is highly desirable, which is achieved by compressing the data before transmission. An alternative solution would be to extract the features before transmission and to transfer feature data only in many cases, feature extraction is more demanding as compared to compression which generates additional workload for the often mobile and low power acquisition devices. 2. Storage of reference data: In most template databases (where the reference data of the enrolled individuals is stored) only the extracted features required for the matching step are stored as opposed to retaining the originally acquired sensor data. However, in case the features should be replaced for some reason (e.g. when a superior or license-free matching technique involving a different feature set becomes available), having stored only extracted features implies the requirement for all legitimate users for a re-enrollment, which can be expensive and is highly undesired since user-acceptance of the entire biometric system will suffer. Storing the original D. Gritzalis and J. Lopez (Eds.): SEC 2009, IFIP Series 297, pp , c IFIP International Federation for Information Processing 2009
2 Custom JPEG Quantization for Improved Iris Recognition Accuracy 77 sensor data in addition to the features required for the current matching technique solves this problem. Of course, these data need to be stored in compressed (to save storage space) and encrypted (to protect privacy) form. Having found that compression of the raw sensor data can be advantageous in certain applications, we have to identify techniques suited to accomplish this task in an optimal manner. In order to maximize the benefit in terms of data reduction, lossy compression techniques have to be applied. However, the distortions introduced by compression artifacts usually interfere with subsequent feature extraction and may degrade the matching results. In particular, FRR or FNMR will increase (since features of the data of legitimate users are extracted less accurately from compressed data) which in turn affects user convenience and general acceptance of the biometric system. In extreme cases, even FAR or FMR might be affected. In this work, we will focus on the lossy compression of iris images using the JPEG standard. We discuss the use of custom quantization matrices in order to reflect the specific properties of iris imagery. Contrasting to the overwhelming majority of literature and studies in the field of compressing biometric sample data, we will not rely on assessing the resulting objective and subjective image quality after compression, but we will apply a biometric iris recognition systems to the compressed sensor data to evaluate the effects of compression on recognition accuracy, in particular on the matching results of legitimate and illegitimate users. In Section 2, we will review and discuss the available literature on biometric sample data compression with focus on iris data storage. Section 3 is the main part of this work where we discuss properties of iris imagery and present several variants of custom JPEG quantization matrices (designed in order to hopefully improve recognition accuracy). In section 4 we first describe the employed iris recognition system and the data this algorithm are applied to. Subsequently we discuss our experimental results with respect to the observed improvements of recognition accuracy. 2 Iris Image Compression Iris recognition is claimed to be the most secure biometric modality exhibiting practically 0% FAR and low FRR. An interesting fact is that the iris recognition market is strongly dominated by Iridian Inc. based technology which is based on algorithms of J. Daugman [2]. The certainly most relevant standard for compressing iris image data is the recent ISO/IEC standard on Biometric Data Interchange Formats. While the data formats specified by the ISO/IEC standard are fixed at present state, their customized use tailored to a specific target modality and the corresponding impact on recognition accuracy as compared to the default settings has not been investigated. This is the scope of the current paper. ISO/IEC allows iris image data to be stored in lossy manner in the JPEG and JPEG2000 formats. Two types of iris image data are considered: rectilinear images (i.e. images of the entire eye) and polar images (which are basically the result of iris detection and segmentation), the latter much smaller in terms of storage requirement (e.g. 2kB vs kB for rectilinear images). It is important to note that with this standardization it
3 78 G.S. Kostmajer, H. Stögner, and A. Uhl might become more attractive for companies to investigate alternatives to Iridian products due to the available common data format iris recognition systems can rely on. Only recently, first results and techniques are available on iris image compression and its impact on recognition performance. Ives et al. [5,6] apply JPEG2000 up to a compression rate of 20 to rectilinear image data (the CASIA database and a proprietary image collection is used) and investigates the effects on FAR and FRR of a 1-D version of the Daugman algorithm (the same system which is used in this study). Rakshit and Monro [11] again use JPEG2000 to compress polar iris images up to a compression rate of 80 and studies the impact on verification accuracy of three iris recognition systems (including the Daugman algorithm, the CASIA database is used). Daugman and Downing [3] apply JPEG and JPEG2000 to rectilinear image data (the NIST ICE database is used) and remove image background (i.e. parts of the image not being part of the eye like eye-lids are replaced by constant average gray) before compression is applied. A more compact way of representing the Daugman IrisCode is discussed in [12], however, these results refer to template compression and are only valid for the techniques related to Iridian products. In previous work [9,7], we have compared five general purpose compression algorithms (including JPEG and JPEG2000) with respect to their impact on iris recognition accuracy of three different recognition schemes (the CASIA database has been used). In accordance to [3] superior compression performance of JPEG2000 over JPEG is found especially for low bitrates, however, for high and medium quality JPEG is still an option to consider. So far, compression algorithms have been applied to iris imagery with their respective standard settings. In the subsequent study we apply JPEG as covered by ISO/IEC to rectilinear iris images and propose to use custom quantization matrices adapted to properties of iris imagery. Contrasting to the optimization of the JPEG quantization matrix with respect to human perception as done for the development of the standard matrix, rate/distortion criteria have also been used successfully for the design of this matrix (see e.g. [4]). In [1] compression algorithms tuned for application in the pattern recognition context are proposed, which are based on the modification of the standard compression algorithms: this is done by emphasizing middle and high frequencies and discarding low frequencies (the standard JPEG quantization matrix is rotated by 180 degrees). JPEG quantization matrix optimization has already been considered in biometrics [8] employ a rate/distortion criterion in the context of face recognition and achieve superior recognition performance as compared to the standard matrix. 3 Custom JPEG Quantization The JPEG still image compression standard [10] allows to use custom quantization tables (Q-tables) in case image material with special properties is subject to compression. These tables are signalled in the header information. The default quantization matrices have been designed with respect to psychovisual optimality employing large scale experimentation involving a high number of test subjects. There are two reasons which suggest to use different Q-tables as the default configuration: First, iris imagery might have different properties as compared to common arbitrary images, and second, a pleasant viewing experience as being the aim in designing the default tables, might
4 Custom JPEG Quantization for Improved Iris Recognition Accuracy 79 not deliver optimal matching results in the context of biometric recognition (e.g. sharp edges required for exact matching could appear appealing to human observers). Therefore, as a first stage, we have investigated iris imagery in more detail. 8x8 pixel blocks have been subjected to DCT transform and the resulting coefficients are averaged for a large number of blocks (i.e. 2000, 525, and blocks for the three types of imagery, respectively). As a first class of blocks, we have used arbitrary images and blocks are extracted randomly. The second class of blocks is extracted iris texture taken left and right of the pupil while the third class is taken from polar iris images generated by the employed matching algorithm (see below). Fig. 1 displays the result of all three classes where the DC and the largest AC coefficient are set to white, zero is set to black and the remaining values are scaled in between (note that the logarithm is applied to the magnitude of all coefficients before this scaling operation). (a) arbitraryblocks (b) polar iris blocks (c) horizontal iris blocks Fig. 1. Averaged 8x8 DCT blocks The arbitrary blocks (Fig. 1.a) show the typical expected behaviour with decreasing coefficient magnitude for increasing frequency and symmetry with respect to the coordinate axes. Fig. 1.b reveals that in polar iris images there is more energy in the higher frequencies in horizontal direction as compared to vertical direction. This is to be expected since luminance fluctuations in iris texture are more pronounced in radial direction as compared to perpendicular direction. Finally, Fig. 1.c confirms this expectation showing more energy in the higher frequencies in vertical direction. While we cannot exploit the direction bias of iris texture in compression since we are dealing with rectangular iris images, we conjecture that the highest and medium (a) Q-table 12 (b) Q-table 13 (c) Q-table 15 (d) Q-table 16 Fig. 2. JPEG Quantization tables
5 80 G.S. Kostmajer, H. Stögner, and A. Uhl frequencies might not be required for he matching stage due to the coarse quantization used for template generation while at least medium frequencies are required for pleasant viewing. Fig. 2 displays the Q-tables used in our experiments. From left to right, an increasing amount of high frequencies is suppressed following the zig-zag scan known from JPEG bitstream generation (by dividing the coefficients by 255), coefficients not affected are quantized as defined in the default Q-table. For the rightmost Q-table 16, only the 6 leading coefficients are quantized in the regular manner, the rest is severely quantized. The rationale behind the selection of these matrices is to investigate the importance of medium frequency information in iris recognition (high frequency information is assumed to be not useful in any case). 4 Experimental Study 4.1 Setting and Methods Iris Recognition System The employed iris recognition system is Libor Masek s Matlab implementation 1 of a 1-D version of the Daugman iris recognition algorithm. First, this algorithm segments the eye image into the iris and the remainder of the image. Iris image texture is mapped to polar coordinates resulting in a rectangular patch which is denoted polar image. After extracting the features if the iris (which are strongly quantized phase responses of complex 1-D Gabor filters in this case), considering translation, rotations and disturbed regions in the iris (a noise mask is generated), the algorithm outputs the similarity score by giving the hamming distance between two extracted templates. The range of the hamming distance reaches from zero (ideal matching of two iris images of the same person) to 0.5 (ideal mismatch between two iris images of different persons) Sample Data For all our experiments we considered 320x280 pixel images with 8-bit grayscale information per pixel from the CASIA iris image database. For rectilinear iris images, we applied the experimental calculations on the images of 100 persons using 3 images for each eye (i.e. 600 images). Note that it makes an important difference if compression is applied to rectangular or polar iris images which has an important implication on the performance of the entire system. Whereas in the case of compressing polar iris images [11] only the iris texture information is affected, in the case of compressing rectangular image data also the iris detection and determination of the noise mask is potentially affected in addition to degrading texture information. Figure 3 shows an example of a JPEG2000 compressed (compression rate 96) iris image of one person, together with the extracted iris template data and the noise masks (template and noise mask have been scaled in y-direction by a factor of 4 for proper display). The noise mask is hardly affected by the compression, whereas in the two templates differences resulting from compression artifacts are clearly observable. 1 pk/studentprojects/libor/ sourcecode.html 2
6 Custom JPEG Quantization for Improved Iris Recognition Accuracy 81 Fig. 3. Comparison of uncompressed/compressed iris image and the corresponding iris templates and noise masks Compression can be used in various stages of the matching process. Either the stored reference data may be in compressed form, or the sample data acquired for verification may be compressed (e.g. for efficient transfer), or both. Therefore, we use two settings in our experiments: either both images are compressed and matched against each other or only one image is compressed in the matching stage. For investigating correct matches (matches from legitimate users enrolled in the database), we rely on generated images (i.e. for each of the 100 persons, we have 3 images for each eye resulting in 3! possible correct matches for each eye; for 200 eyes, this totals in 1200 images per compression rate; considering the 10 different compression rates we finally result in overall images considered). This is only true in the scenario with only 1 compressed image, for 2 compressed images this number is half-ed due to symmetry reasons. For investigating matches between different persons (imposter matches), far more data is available of course. 4.2 Experimental Results Figure 4.a shows the averaged rate distortion comparison of the different compression algorithms applied to all iris images considered for three Q-tables. It is clearly displayed that employment of the default Q-table results the best PSNR across the entire range of bitrates considered. Therefore, a corresponding matching behaviour (best results for the default Q-table) could be expected in the context of iris recognition. In the following, we investigate the impact of compression on the matching score (i.e. obtained hamming distance (HD)). The interval of 0.26 HD 0.35 is discussed as the border between match and mismatch in iris recognition [2] based on recommendations for the specific technique [5] used and results shown subsequently we suggest to choose HD = 0.34 as decision criterion between match and mismatch. Fig. 4.b shows the plot of the HD after applying the iris recognition algorithm to both JPEG compressed iris images in the case of imposter matches (i.e. irises of different persons / eyes are matched against each other). The x-axis shows the compression rates, whereas the y-axis shows the averaged hamming distance. For reference, we have included the average HD for the case of uncompressed images as horizontal dotted line in light gray (labelled UC).
7 82 G.S. Kostmajer, H. Stögner, and A. Uhl (a) PSNR (b) HD (imposters) Fig. 4. Impact of varying compression rate For the case of imposters the HD remains above 0.46 across the whole range of compression rates for all sensible compression rates. This means that JPEG compression does not introduce any false positive matches on average no matter how severe compression is applied. Of course, this does not exclude the possibility of the existence of statistical outliers of course. There are no significant differences among the different Q- tables since the fluctuations occur in a negligible range. The same behaviour is observed in case only one image is compressed (not shown). In the case of genuine users (see Fig. 5), the mean value of the HD in the uncompressed case is approximately First we consider the standard Q-table (labelled STQ). For increasing compression rate the HD stays constant at approximately until the compression rate exceeds 10 and increases subsequently. A further increase of the compression rate leads to a steady increase of HD and crosses the suggested matching threshold of 0.34 between compression rates 30 and 40. Note that the reported numbers refer to averaged HD values which implies the occurrence of a significant number of false negative matches at this compression rate. In the case of both images being compressed, HD is lower on average up to a compression rate of 20. (a) one image compressed (b) both images compressed Fig. 5. Impact of varying compression rate on HD of genuine users matches
8 Custom JPEG Quantization for Improved Iris Recognition Accuracy 83 When comparing these results to those obtained with different Q-tables, we notice that Q-tables 15 and 16 clearly improve on the results of STQ from compression rate 20 upwards where Q-table 16 does so in a more pronounced manner. For compression rate 10 all other Q-tables improve slightly on STQ and for compression rate 5, Q-tables 12 and 13 are superior to STQ in terms of average HD. In the case of two images being compressed, the observed behaviour is more significant but similar in principle. These results indicate that PSNR is indeed NOT a good predictor for matching performance with compressed iris images in terms of average Hamming distance. The claim that compression up to a rate of 16 even improves the matching scores of not compressed images [11] can be supported at least for the 2 compressed images case and the STQ, for better Q-tables this is correct even up to compression rate 20 and higher. In order to consider the hidden statistical outliers in the comparisons and to use a quantity often employed in the assessment of biometric system performance, we will focus on the receiver operating characteristic (ROC) by computing and plotting the false rejection rate (FRR) against the false acceptance rate (FAR) for different compression rates: FRR = Number of (false) negative matches Number of legitimate users matches. (1) Number of (false) positive matches FAR =. (2) Number of imposter matches Figs. 6 to 8 compare the ROC of different Q-tables for compression rates 5, 10, and 20 since it is not realistic to operate the iris recognition system at a higher compression rate. Again, the two compressed image scenario is compared to the case where only one image is compressed. For compression rate 5, our proposed Q-tables are not really able to substantially improve ROC. While for one compressed image (Fig. 6.b) only Q-table 15 improves STQ slightly (and only starting from FRR > 0.08), significant improvements are seen for Q-tables 15, 16, and 13 (Fig. 6.a). However, only Q-table 15 starts improving at a reasonable low FRR> In the case of compression rate 10, the situation changes drastically. Again, Q-table 15 shows the most significant improvements. For two compressed images (Fig. 7.a), at FAR 0.028, Q-table delivers a FRR of almost 0 whereas STQ exhibits an FRR of Also the other proposed Q-tables improve on STQ in the interesting lower FRR range. In the case of only one compressed image we still find improvements, but far less pronounced (Fig. 7.b): For an FAR of 0.041, again Q-table 15 gives FRR almost 0 whereas STQ is almost at FRR 0.9. Again, also Q-tables 13 and 16 improve on STQ. Finally, when turning to compression rate 20 the situation is different (Fig. 8): now Q-table 16 shows the most significant improvements in the two compressed images case and shows behaviour similar to Q-table 15 also for one compressed image. The most noticeable improvement is found in the latter case at a FAR of where Q-table 15 exhibits FRR close to 0 and STQ has an FRR of 1.2. There is one more interesting thing to note: at least for compression rate 20 it is entirely clear that it is NOT advantageous to compress both images involved in matching
9 84 G.S. Kostmajer, H. Stögner, and A. Uhl (a) 2 compressed images (b) 1 compressed image Fig. 6. Compression rate 5 (a) 2 compressed images (b) 1 compressed image Fig. 7. Compression rate 10 (a) 2 compressed images (b) 1 compressed image Fig. 8. Compression rate 20 in terms of ROC, clearly the case of one compressed image is superior here. For compression rates 5 and 10 the better choice highly depends on the target FAR/FRR and the Q-table in use.
10 Custom JPEG Quantization for Improved Iris Recognition Accuracy 85 5 Conclusion and Future Work We have found that custom designed quantization tables in JPEG can improve matching results in terms of average HD and ROC behaviour. This is especially true for compression rates of 10 and higher where improvements are seen especially for low FAR. In this case, FRR can be limited much more effective as compared to the default quantization table. In addition to that we have found PSNR to be not at all suited to predict the recognition performance in iris recognition systems. The advantage of compressing both images involved in the matching process cannot be confirmed, in contrary, evidence for the opposite is found for higher compression rates. In future work we will consider additional alternative iris recognition algorithms in order to identify possible interference between compression technique and iris recognition system. Furthermore we will employ optimization techniques (e.g. GAs) in order to design even more customized quantization tables for this application scenario. Acknowledgements Most of the work described in this paper has been done in the scope of the ILV Compression Technologies and Data Formats (winter term 2007/2008) in the master program on Communication Engineering for IT at Carinthia Tech Institute. The artificial name Gerald Stefan Kostmajer represents the following group of students working on this project: Eigner Raimund, Fischelschweiger Erik, Gernig Stefan, Jereb Martin, Kampusch Andreas, Konrad Mario, Lenzhofer Michael, Mataln Martin, Rabl Manuel, Schlgl Daniel, and Theuermann Klaus. This work has been partially supported by the Austrian Science Fund, project no. L554-N15. References 1. Chen, M., Zhang, S., Karim, M.: Modification of standard image compression methods for correlation-based pattern recognition. Optical Engineering 43(8), (2004) 2. Daugman, J.: How iris recognition works. IEEE Transactions on Circiuts and Systems for Video Technology 14(1), (2004) 3. Daugman, J., Downing, C.: Effect of severe image compression on iris recognition performance. IEEE Transactions on Information Forensics and Security 3(1), (2008) 4. Fong, W., Chan, S., Ho, K.: Designing JPEG quantization matrix using rate-distortion approachand human visual system model. In: Proceedings of the IEEE International Conference on Communications (ICC 1997), vol. 3, pp (1997) 5. Ives, R., Bonney, B., Etter, D.: Effect of image compression on iris recognition. In: IMTC 2005 Instrumentation and Measurement Technology Conference (2005) 6. Ives, R.W., Broussard, R.P., Kennell, L.R., Soldan, D.L.: Effects of image compression on iris recognition system performance. Journal of Electronic Imaging 17, 011, 015 (2008), doi: / Jenisch, S., Lukesch, S., Uhl, A.: Comparison of compression algorithms impact on iris recognition accuracy II: revisiting JPEG. In: Proceedings of SPIE, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, vol. 6819, p M ff, San Jose, CA, USA (2008)
11 86 G.S. Kostmajer, H. Stögner, and A. Uhl 8. Jeong, G.M., Kim, C., Ahn, H.S., Ahn, B.J.: JPEG quantization table design for face images and its application to face recognition. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science E69-A(11), (2006) 9. Matschitsch, S., Tschinder, M., Uhl, A.: Comparison of compression algorithms impact on iris recognition accuracy. In: Lee, S.-W., Li, S.Z. (eds.) ICB LNCS, vol. 4642, pp Springer, Heidelberg (2007) 10. Pennebaker, W., Mitchell, J.: JPEG Still image compression standard. Van Nostrand Reinhold, New York (1993) 11. Rakshit, S., Monro, D.: Effects of sampling and compression on human iris verification. In: Proceedings of the IEEE International Conference on Acustics, Speech, and Signal Processing (ICASSP 2006), Tolouse, France, pp. II 337 II 340 (2006) 12. von Seelen, U.: IrisCode template compression and its effects on authentication performance. In: Biometrics Consortium Conference 2003 (2003)
Comparison of Compression Algorithms Impact on Iris Recognition Accuracy
Comparison of Compression Algorithms Impact on Iris Recognition Accuracy Stefan Matschitsch 1, Martin Tschinder 1, and Andreas Uhl 1,2 1 School of Telematics & Network Engineering, Carinthia Tech Institute,
More informationEffects of JPEG XR Compression Settings on Iris Recognition Systems
Effects of JPEG XR Compression Settings on Iris Recognition Systems Kurt Horvath 1, Herbert Stögner 1, and Andreas Uhl 1,2 1 School of CEIT, Carinthia University of Applied Sciences, Austria 2 Department
More informationOptimisation of JPEG XR Quantisation Settings in Iris Recognition Systems
Optimisation of JPEG XR Quantisation Settings in Iris Recognition Systems Kurt Horvath and Herbert Stögner School of Communication Engineering for IT Carinthia University of Applied Sciences Klagenfurt,
More informationSemi-Fragile Watermarking in Biometric Systems: Template Self-Embedding
Semi-Fragile Watermarking in Biometric Systems: Template Self-Embedding Reinhard Huber 1, Herbert Stögner 1, and Andreas Uhl 1,2 1 School of CEIT, Carinthia University of Applied Sciences, Austria 2 Department
More informationComputationally Efficient Serial Combination of Rotation-invariant and Rotation Compensating Iris Recognition Algorithms
Computationally Efficient Serial Combination of Rotation-invariant and Rotation Compensating Iris Recognition Algorithms Andreas Uhl Department of Computer Sciences University of Salzburg, Austria uhl@cosy.sbg.ac.at
More informationComparison of Compression Algorithms Impact on Fingerprint and Face Recognition Accuracy
January 31, 2007 Comparison of Compression Algorithms Impact on Fingerprint and Face Recognition Accuracy Severin Kampl, Austria Visual Communications and Image Processing 2007, San Jose Convention Center,
More informationCOMPUTATIONALLY EFFICIENT SERIAL COMBINATION OF ROTATION-INVARIANT AND ROTATION COMPENSATING IRIS RECOGNITION ALGORITHMS
COMPUTATIONALLY EFFICIENT SERIAL COMBINATION OF ROTATION-INVARIANT AND ROTATION COMPENSATING IRIS RECOGNITION ALGORITHMS Mario Konrad, Herbert Stögner School of Communication Engineering for IT, Carinthia
More informationExperimental Study on Lossless Compression of Biometric Iris Data
Experimental Study on Lossless Compression of Biometric Iris Data Kurt Horvath, Herbert Stögner, Andreas Uhl, Georg Weinhandel Presenter: Rade Kutil Department of Computer Sciences University of Salzburg,
More informationShifting Score Fusion: On Exploiting Shifting Variation in Iris Recognition
Preprocessing c 211 ACM This is the author s version of the work It is posted here by permission of ACM for your personal use Not for redistribution The definitive version was published in: C Rathgeb,
More informationAn Efficient Iris Recognition Using Correlation Method
, pp. 31-40 An Efficient Iris Recognition Using Correlation Method S.S. Kulkarni 1, G.H. Pandey 2, A.S.Pethkar 3, V.K. Soni 4, &P.Rathod 5 Department of Electronics and Telecommunication Engineering, Thakur
More informationTechnical Report. Cross-Sensor Comparison: LG4000-to-LG2200
Technical Report Cross-Sensor Comparison: LG4000-to-LG2200 Professors: PhD. Nicolaie Popescu-Bodorin, PhD. Lucian Grigore, PhD. Valentina Balas Students: MSc. Cristina M. Noaica, BSc. Ionut Axenie, BSc
More informationIRIS Recognition System Based On DCT - Matrix Coefficient Lokesh Sharma 1
Volume 2, Issue 10, October 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com
More informationEnhanced Iris Recognition System an Integrated Approach to Person Identification
Enhanced Iris Recognition an Integrated Approach to Person Identification Gaganpreet Kaur Research Scholar, GNDEC, Ludhiana. Akshay Girdhar Associate Professor, GNDEC. Ludhiana. Manvjeet Kaur Lecturer,
More informationEfficient Iris Sample Data Protection using Selective JPEG2000 Encryption of Normalised Texture
c IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution
More informationA Fast and Accurate Eyelids and Eyelashes Detection Approach for Iris Segmentation
A Fast and Accurate Eyelids and Eyelashes Detection Approach for Iris Segmentation Walid Aydi, Lotfi Kamoun, Nouri Masmoudi Department of Electrical National Engineering School of Sfax Sfax University
More informationIris Recognition for Eyelash Detection Using Gabor Filter
Iris Recognition for Eyelash Detection Using Gabor Filter Rupesh Mude 1, Meenakshi R Patel 2 Computer Science and Engineering Rungta College of Engineering and Technology, Bhilai Abstract :- Iris recognition
More informationCritique: Efficient Iris Recognition by Characterizing Key Local Variations
Critique: Efficient Iris Recognition by Characterizing Key Local Variations Authors: L. Ma, T. Tan, Y. Wang, D. Zhang Published: IEEE Transactions on Image Processing, Vol. 13, No. 6 Critique By: Christopher
More informationStatistical Modeling of Huffman Tables Coding
Statistical Modeling of Huffman Tables Coding S. Battiato 1, C. Bosco 1, A. Bruna 2, G. Di Blasi 1, and G.Gallo 1 1 D.M.I. University of Catania - Viale A. Doria 6, 95125, Catania, Italy {battiato, bosco,
More informationAlgorithms for Recognition of Low Quality Iris Images. Li Peng Xie University of Ottawa
Algorithms for Recognition of Low Quality Iris Images Li Peng Xie University of Ottawa Overview Iris Recognition Eyelash detection Accurate circular localization Covariance feature with LDA Fourier magnitude
More informationComparing Binary Iris Biometric Templates based on Counting Bloom Filters
Christian Rathgeb, Christoph Busch, Comparing Binary Iris Biometric Templates based on Counting Bloom Filters, In Proceedings of the 18th Iberoamerican Congress on Pattern Recognition (CIARP 13), LNCS
More informationSpatial Frequency Domain Methods for Face and Iris Recognition
Spatial Frequency Domain Methods for Face and Iris Recognition Dept. of Electrical and Computer Engineering Carnegie Mellon University Pittsburgh, PA 15213 e-mail: Kumar@ece.cmu.edu Tel.: (412) 268-3026
More informationGraph Matching Iris Image Blocks with Local Binary Pattern
Graph Matching Iris Image Blocs with Local Binary Pattern Zhenan Sun, Tieniu Tan, and Xianchao Qiu Center for Biometrics and Security Research, National Laboratory of Pattern Recognition, Institute of
More informationIncremental Iris Recognition: A Single-algorithm Serial Fusion Strategy to Optimize Time Complexity
C Rathgeb, A Uhl, and P Wild Iris Recognition: A Single-algorithm Serial Fusion Strategy to Optimize Time Complexity In Proceedings of the IEEE 4th International Conference on Biometrics: Theory, Applications,
More informationA Video Watermarking Algorithm Based on the Human Visual System Properties
A Video Watermarking Algorithm Based on the Human Visual System Properties Ji-Young Moon 1 and Yo-Sung Ho 2 1 Samsung Electronics Co., LTD 416, Maetan3-dong, Paldal-gu, Suwon-si, Gyenggi-do, Korea jiyoung.moon@samsung.com
More informationDEFORMABLE MATCHING OF HAND SHAPES FOR USER VERIFICATION. Ani1 K. Jain and Nicolae Duta
DEFORMABLE MATCHING OF HAND SHAPES FOR USER VERIFICATION Ani1 K. Jain and Nicolae Duta Department of Computer Science and Engineering Michigan State University, East Lansing, MI 48824-1026, USA E-mail:
More informationA biometric iris recognition system based on principal components analysis, genetic algorithms and cosine-distance
Safety and Security Engineering VI 203 A biometric iris recognition system based on principal components analysis, genetic algorithms and cosine-distance V. Nosso 1, F. Garzia 1,2 & R. Cusani 1 1 Department
More informationA New Encoding of Iris Images Employing Eight Quantization Levels
A New Encoding of Iris Images Employing Eight Quantization Levels Oktay Koçand Arban Uka Computer Engineering Department, Epoka University, Tirana, Albania Email: {okoc12, auka}@epoka.edu.al different
More informationInteractive Progressive Encoding System For Transmission of Complex Images
Interactive Progressive Encoding System For Transmission of Complex Images Borko Furht 1, Yingli Wang 1, and Joe Celli 2 1 NSF Multimedia Laboratory Florida Atlantic University, Boca Raton, Florida 33431
More informationFeature-level Fusion for Effective Palmprint Authentication
Feature-level Fusion for Effective Palmprint Authentication Adams Wai-Kin Kong 1, 2 and David Zhang 1 1 Biometric Research Center, Department of Computing The Hong Kong Polytechnic University, Kowloon,
More informationCHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM
109 CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM Security is considered to be the most critical factor in many applications. The main issues of such
More informationVideo Compression An Introduction
Video Compression An Introduction The increasing demand to incorporate video data into telecommunications services, the corporate environment, the entertainment industry, and even at home has made digital
More informationA reversible data hiding based on adaptive prediction technique and histogram shifting
A reversible data hiding based on adaptive prediction technique and histogram shifting Rui Liu, Rongrong Ni, Yao Zhao Institute of Information Science Beijing Jiaotong University E-mail: rrni@bjtu.edu.cn
More informationDigital Image Steganography Techniques: Case Study. Karnataka, India.
ISSN: 2320 8791 (Impact Factor: 1.479) Digital Image Steganography Techniques: Case Study Santosh Kumar.S 1, Archana.M 2 1 Department of Electronicsand Communication Engineering, Sri Venkateshwara College
More informationVC 12/13 T16 Video Compression
VC 12/13 T16 Video Compression Mestrado em Ciência de Computadores Mestrado Integrado em Engenharia de Redes e Sistemas Informáticos Miguel Tavares Coimbra Outline The need for compression Types of redundancy
More informationBIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition
BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition Hiren D. Joshi Phd, Dept. of Computer Science Rollwala Computer Centre
More informationCMPT 365 Multimedia Systems. Media Compression - Image
CMPT 365 Multimedia Systems Media Compression - Image Spring 2017 Edited from slides by Dr. Jiangchuan Liu CMPT365 Multimedia Systems 1 Facts about JPEG JPEG - Joint Photographic Experts Group International
More informationA Very Low Bit Rate Image Compressor Using Transformed Classified Vector Quantization
Informatica 29 (2005) 335 341 335 A Very Low Bit Rate Image Compressor Using Transformed Classified Vector Quantization Hsien-Wen Tseng Department of Information Management Chaoyang University of Technology
More informationQuality of biometric data: definition and validation of metrics. Christophe Charrier GREYC - Caen, France
Quality of biometric data: definition and validation of metrics Christophe Charrier GREYC - Caen, France 1 GREYC Research Lab Le pôle TES et le sans-contact Caen 2 3 Introduction Introduction Quality of
More informationIRIS SEGMENTATION OF NON-IDEAL IMAGES
IRIS SEGMENTATION OF NON-IDEAL IMAGES William S. Weld St. Lawrence University Computer Science Department Canton, NY 13617 Xiaojun Qi, Ph.D Utah State University Computer Science Department Logan, UT 84322
More informationOnline Signature Verification Technique
Volume 3, Issue 1 ISSN: 2320-5288 International Journal of Engineering Technology & Management Research Journal homepage: www.ijetmr.org Online Signature Verification Technique Ankit Soni M Tech Student,
More informationA New Approach to Compressed Image Steganography Using Wavelet Transform
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 5, Ver. III (Sep. Oct. 2015), PP 53-59 www.iosrjournals.org A New Approach to Compressed Image Steganography
More informationDYADIC WAVELETS AND DCT BASED BLIND COPY-MOVE IMAGE FORGERY DETECTION
DYADIC WAVELETS AND DCT BASED BLIND COPY-MOVE IMAGE FORGERY DETECTION Ghulam Muhammad*,1, Muhammad Hussain 2, Anwar M. Mirza 1, and George Bebis 3 1 Department of Computer Engineering, 2 Department of
More informationImplementation and analysis of Directional DCT in H.264
Implementation and analysis of Directional DCT in H.264 EE 5359 Multimedia Processing Guidance: Dr K R Rao Priyadarshini Anjanappa UTA ID: 1000730236 priyadarshini.anjanappa@mavs.uta.edu Introduction A
More informationCompression of RADARSAT Data with Block Adaptive Wavelets Abstract: 1. Introduction
Compression of RADARSAT Data with Block Adaptive Wavelets Ian Cumming and Jing Wang Department of Electrical and Computer Engineering The University of British Columbia 2356 Main Mall, Vancouver, BC, Canada
More informationA Minimum Number of Features with Full-Accuracy Iris Recognition
Vol. 6, No. 3, 205 A Minimum Number of Features with Full-Accuracy Iris Recognition Ibrahim E. Ziedan Dept. of computers and systems Faculty of Engineering Zagazig University Zagazig, Egypt Mira Magdy
More informationAn introduction on several biometric modalities. Yuning Xu
An introduction on several biometric modalities Yuning Xu The way human beings use to recognize each other: equip machines with that capability Passwords can be forgotten, tokens can be lost Post-9/11
More informationIRIS recognition II. Eduard Bakštein,
IRIS recognition II. Eduard Bakštein, edurard.bakstein@fel.cvut.cz 22.10.2013 acknowledgement: Andrzej Drygajlo, EPFL Switzerland Iris recognition process Input: image of the eye Iris Segmentation Projection
More informationIntra-Mode Indexed Nonuniform Quantization Parameter Matrices in AVC/H.264
Intra-Mode Indexed Nonuniform Quantization Parameter Matrices in AVC/H.264 Jing Hu and Jerry D. Gibson Department of Electrical and Computer Engineering University of California, Santa Barbara, California
More informationMesh Based Interpolative Coding (MBIC)
Mesh Based Interpolative Coding (MBIC) Eckhart Baum, Joachim Speidel Institut für Nachrichtenübertragung, University of Stuttgart An alternative method to H.6 encoding of moving images at bit rates below
More informationAUDIOVISUAL COMMUNICATION
AUDIOVISUAL COMMUNICATION Laboratory Session: Discrete Cosine Transform Fernando Pereira The objective of this lab session about the Discrete Cosine Transform (DCT) is to get the students familiar with
More information(Refer Slide Time 00:17) Welcome to the course on Digital Image Processing. (Refer Slide Time 00:22)
Digital Image Processing Prof. P. K. Biswas Department of Electronics and Electrical Communications Engineering Indian Institute of Technology, Kharagpur Module Number 01 Lecture Number 02 Application
More informationData Hiding in Video
Data Hiding in Video J. J. Chae and B. S. Manjunath Department of Electrical and Computer Engineering University of California, Santa Barbara, CA 9316-956 Email: chaejj, manj@iplab.ece.ucsb.edu Abstract
More informationOnline and Offline Fingerprint Template Update Using Minutiae: An Experimental Comparison
Online and Offline Fingerprint Template Update Using Minutiae: An Experimental Comparison Biagio Freni, Gian Luca Marcialis, and Fabio Roli University of Cagliari Department of Electrical and Electronic
More informationA Image Comparative Study using DCT, Fast Fourier, Wavelet Transforms and Huffman Algorithm
International Journal of Engineering Research and General Science Volume 3, Issue 4, July-August, 15 ISSN 91-2730 A Image Comparative Study using DCT, Fast Fourier, Wavelet Transforms and Huffman Algorithm
More informationEE 5359 MULTIMEDIA PROCESSING SPRING Final Report IMPLEMENTATION AND ANALYSIS OF DIRECTIONAL DISCRETE COSINE TRANSFORM IN H.
EE 5359 MULTIMEDIA PROCESSING SPRING 2011 Final Report IMPLEMENTATION AND ANALYSIS OF DIRECTIONAL DISCRETE COSINE TRANSFORM IN H.264 Under guidance of DR K R RAO DEPARTMENT OF ELECTRICAL ENGINEERING UNIVERSITY
More informationResearch Article Improvements in Geometry-Based Secret Image Sharing Approach with Steganography
Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2009, Article ID 187874, 11 pages doi:10.1155/2009/187874 Research Article Improvements in Geometry-Based Secret Image Sharing
More informationJPEG Copy Paste Forgery Detection Using BAG Optimized for Complex Images
JPEG Copy Paste Forgery Detection Using BAG Optimized for Complex Images Dessalegn Atnafu AYALNEH*, Hyoung Joong KIM*, Yong Soo CHOI** *CIST (Center for Information Security Technologies), Korea University
More informationReducing FMR of Fingerprint Verification by Using the Partial Band of Similarity
Reducing FMR of Fingerprint Verification by Using the Partial Band of Similarity Seung-Hoon Chae 1,Chang-Ho Seo 2, Yongwha Chung 3, and Sung Bum Pan 4,* 1 Dept. of Information and Communication Engineering,
More informationFeature Selection by User Specific Feature Mask on a Biometric Hash Algorithm for Dynamic Handwriting
Feature Selection by User Specific Feature Mask on a Biometric Hash Algorithm for Dynamic Handwriting Karl Kümmel, Tobias Scheidat, Christian Arndt and Claus Vielhauer Brandenburg University of Applied
More informationDilation Aware Multi-Image Enrollment for Iris Biometrics
Dilation Aware Multi-Image Enrollment for Iris Biometrics Estefan Ortiz 1 and Kevin W. Bowyer 1 1 Abstract Current iris biometric systems enroll a person based on the best eye image taken at the time of
More informationCompression of Stereo Images using a Huffman-Zip Scheme
Compression of Stereo Images using a Huffman-Zip Scheme John Hamann, Vickey Yeh Department of Electrical Engineering, Stanford University Stanford, CA 94304 jhamann@stanford.edu, vickey@stanford.edu Abstract
More informationLossless Image Compression having Compression Ratio Higher than JPEG
Cloud Computing & Big Data 35 Lossless Image Compression having Compression Ratio Higher than JPEG Madan Singh madan.phdce@gmail.com, Vishal Chaudhary Computer Science and Engineering, Jaipur National
More informationImproving Personal Identification Accuracy Using Multisensor Fusion for Building Access Control Applications
Improving Personal Identification Accuracy Using Multisensor Fusion for Building Access Control Applications Lisa Osadciw, Pramod Varshney, and Kalyan Veeramachaneni laosadci,varshney,kveerama@syr.edu
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Fingerprint Recognition using Robust Local Features Madhuri and
More informationLocating 1-D Bar Codes in DCT-Domain
Edith Cowan University Research Online ECU Publications Pre. 2011 2006 Locating 1-D Bar Codes in DCT-Domain Alexander Tropf Edith Cowan University Douglas Chai Edith Cowan University 10.1109/ICASSP.2006.1660449
More informationImage Compression: An Artificial Neural Network Approach
Image Compression: An Artificial Neural Network Approach Anjana B 1, Mrs Shreeja R 2 1 Department of Computer Science and Engineering, Calicut University, Kuttippuram 2 Department of Computer Science and
More informationOvercompressing JPEG images with Evolution Algorithms
Author manuscript, published in "EvoIASP2007, Valencia : Spain (2007)" Overcompressing JPEG images with Evolution Algorithms Jacques Lévy Véhel 1, Franklin Mendivil 2 and Evelyne Lutton 1 1 Inria, Complex
More informationNetwork-based model for video packet importance considering both compression artifacts and packet losses
Network-based model for video packet importance considering both compression artifacts and packet losses Yuxia Wang Communication University of China Beijing, China, 124 Email: yuxiaw@cuc.edu.cn Ting-Lan
More informationBlock-based Watermarking Using Random Position Key
IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.2, February 2009 83 Block-based Watermarking Using Random Position Key Won-Jei Kim, Jong-Keuk Lee, Ji-Hong Kim, and Ki-Ryong
More informationBlock Mean Value Based Image Perceptual Hashing for Content Identification
Block Mean Value Based Image Perceptual Hashing for Content Identification Abstract. Image perceptual hashing has been proposed to identify or authenticate image contents in a robust way against distortions
More informationAdaptive Quantization for Video Compression in Frequency Domain
Adaptive Quantization for Video Compression in Frequency Domain *Aree A. Mohammed and **Alan A. Abdulla * Computer Science Department ** Mathematic Department University of Sulaimani P.O.Box: 334 Sulaimani
More informationPartial Face Matching between Near Infrared and Visual Images in MBGC Portal Challenge
Partial Face Matching between Near Infrared and Visual Images in MBGC Portal Challenge Dong Yi, Shengcai Liao, Zhen Lei, Jitao Sang, and Stan Z. Li Center for Biometrics and Security Research, Institute
More informationCompressive Sensing for Multimedia. Communications in Wireless Sensor Networks
Compressive Sensing for Multimedia 1 Communications in Wireless Sensor Networks Wael Barakat & Rabih Saliba MDDSP Project Final Report Prof. Brian L. Evans May 9, 2008 Abstract Compressive Sensing is an
More informationMRT based Fixed Block size Transform Coding
3 MRT based Fixed Block size Transform Coding Contents 3.1 Transform Coding..64 3.1.1 Transform Selection...65 3.1.2 Sub-image size selection... 66 3.1.3 Bit Allocation.....67 3.2 Transform coding using
More informationFast Mode Decision for H.264/AVC Using Mode Prediction
Fast Mode Decision for H.264/AVC Using Mode Prediction Song-Hak Ri and Joern Ostermann Institut fuer Informationsverarbeitung, Appelstr 9A, D-30167 Hannover, Germany ri@tnt.uni-hannover.de ostermann@tnt.uni-hannover.de
More informationThe Impact of Diffuse Illumination on Iris Recognition
The Impact of Diffuse Illumination on Iris Recognition Amanda Sgroi, Kevin W. Bowyer, and Patrick J. Flynn University of Notre Dame asgroi kwb flynn @nd.edu Abstract Iris illumination typically causes
More informationBiometric Data Hiding: A 3 Factor Authentication Approach to Verify Identity with a Single Image Using Steganography, Encryption and Matching
Biometric Data Hiding: A 3 Factor Authentication Approach to Verify Identity with a Single Image Using Steganography, Encryption and Matching Neha Agrawal and Marios Savvides Carnegie Mellon University
More informationCHAPTER-4 WATERMARKING OF GRAY IMAGES
CHAPTER-4 WATERMARKING OF GRAY IMAGES 4.1 INTRODUCTION Like most DCT based watermarking schemes, Middle-Band Coefficient Exchange scheme has proven its robustness against those attacks, which anyhow, do
More informationEfficient Iris Identification with Improved Segmentation Techniques
Efficient Iris Identification with Improved Segmentation Techniques Abhishek Verma and Chengjun Liu Department of Computer Science New Jersey Institute of Technology Newark, NJ 07102, USA {av56, chengjun.liu}@njit.edu
More informationInternational Journal of Advance Engineering and Research Development. Iris Recognition and Automated Eye Tracking
International Journal of Advance Engineering and Research Development Scientific Journal of Impact Factor (SJIF): 4.72 Special Issue SIEICON-2017,April -2017 e-issn : 2348-4470 p-issn : 2348-6406 Iris
More informationA combined fractal and wavelet image compression approach
A combined fractal and wavelet image compression approach 1 Bhagyashree Y Chaudhari, 2 ShubhanginiUgale 1 Student, 2 Assistant Professor Electronics and Communication Department, G. H. Raisoni Academy
More informationEfficient Image Compression of Medical Images Using the Wavelet Transform and Fuzzy c-means Clustering on Regions of Interest.
Efficient Image Compression of Medical Images Using the Wavelet Transform and Fuzzy c-means Clustering on Regions of Interest. D.A. Karras, S.A. Karkanis and D. E. Maroulis University of Piraeus, Dept.
More informationIris Recognition System with Accurate Eyelash Segmentation & Improved FAR, FRR using Textural & Topological Features
Iris Recognition System with Accurate Eyelash Segmentation & Improved FAR, FRR using Textural & Topological Features Archana V Mire Asst Prof dept of IT,Bapurao Deshmukh College of Engineering, Sevagram
More informationOutline Introduction MPEG-2 MPEG-4. Video Compression. Introduction to MPEG. Prof. Pratikgiri Goswami
to MPEG Prof. Pratikgiri Goswami Electronics & Communication Department, Shree Swami Atmanand Saraswati Institute of Technology, Surat. Outline of Topics 1 2 Coding 3 Video Object Representation Outline
More informationINTERPRETING FINGERPRINT AUTHENTICATION PERFORMANCE TECHNICAL WHITE PAPER
INTERPRETING FINGERPRINT AUTHENTICATION PERFORMANCE TECHNICAL WHITE PAPER Fidelica Microsystems, Inc. 423 Dixon Landing Rd. Milpitas, CA 95035 1 INTRODUCTION The fingerprint-imaging segment of the biometrics
More informationVideo Inter-frame Forgery Identification Based on Optical Flow Consistency
Sensors & Transducers 24 by IFSA Publishing, S. L. http://www.sensorsportal.com Video Inter-frame Forgery Identification Based on Optical Flow Consistency Qi Wang, Zhaohong Li, Zhenzhen Zhang, Qinglong
More informationFeatures. Sequential encoding. Progressive encoding. Hierarchical encoding. Lossless encoding using a different strategy
JPEG JPEG Joint Photographic Expert Group Voted as international standard in 1992 Works with color and grayscale images, e.g., satellite, medical,... Motivation: The compression ratio of lossless methods
More informationTutorial 8. Jun Xu, Teaching Asistant March 30, COMP4134 Biometrics Authentication
Tutorial 8 Jun Xu, Teaching Asistant csjunxu@comp.polyu.edu.hk COMP4134 Biometrics Authentication March 30, 2017 Table of Contents Problems Problem 1: Answer The Questions Problem 2: Daugman s Method Problem
More informationJPEG compression of monochrome 2D-barcode images using DCT coefficient distributions
Edith Cowan University Research Online ECU Publications Pre. JPEG compression of monochrome D-barcode images using DCT coefficient distributions Keng Teong Tan Hong Kong Baptist University Douglas Chai
More informationBiometric Security Roles & Resources
Biometric Security Roles & Resources Part 1 Biometric Systems Skip Linehan Biometrics Systems Architect, Raytheon Intelligence and Information Systems Outline Biometrics Overview Biometric Architectures
More informationBit-Plane Decomposition Steganography Using Wavelet Compressed Video
Bit-Plane Decomposition Steganography Using Wavelet Compressed Video Tomonori Furuta, Hideki Noda, Michiharu Niimi, Eiji Kawaguchi Kyushu Institute of Technology, Dept. of Electrical, Electronic and Computer
More informationSpatial Enhancement Definition
Spatial Enhancement Nickolas Faust The Electro- Optics, Environment, and Materials Laboratory Georgia Tech Research Institute Georgia Institute of Technology Definition Spectral enhancement relies on changing
More informationA new predictive image compression scheme using histogram analysis and pattern matching
University of Wollongong Research Online University of Wollongong in Dubai - Papers University of Wollongong in Dubai 00 A new predictive image compression scheme using histogram analysis and pattern matching
More informationPolar Harmonic Transform for Fingerprint Recognition
International Journal Of Engineering Research And Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 13, Issue 11 (November 2017), PP.50-55 Polar Harmonic Transform for Fingerprint
More informationImage Segmentation Techniques for Object-Based Coding
Image Techniques for Object-Based Coding Junaid Ahmed, Joseph Bosworth, and Scott T. Acton The Oklahoma Imaging Laboratory School of Electrical and Computer Engineering Oklahoma State University {ajunaid,bosworj,sacton}@okstate.edu
More informationA Robust Video Hash Scheme Based on. 2D-DCT Temporal Maximum Occurrence
A Robust Video Hash Scheme Based on 1 2D-DCT Temporal Maximum Occurrence Qian Chen, Jun Tian, and Dapeng Wu Abstract In this paper, we propose a video hash scheme that utilizes image hash and spatio-temporal
More informationAPPM 2360 Project 2 Due Nov. 3 at 5:00 PM in D2L
APPM 2360 Project 2 Due Nov. 3 at 5:00 PM in D2L 1 Introduction Digital images are stored as matrices of pixels. For color images, the matrix contains an ordered triple giving the RGB color values at each
More informationCHAPTER 5 PALMPRINT RECOGNITION WITH ENHANCEMENT
145 CHAPTER 5 PALMPRINT RECOGNITION WITH ENHANCEMENT 5.1 INTRODUCTION This chapter discusses the application of enhancement technique in palmprint recognition system. Section 5.2 describes image sharpening
More informationBiometric Security System Using Palm print
ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference
More informationGurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3
Volume 8 Issue 2 March 2017 - Sept 2017 pp. 72-80 available online at www.csjournals.com A Novel Approach to Improve the Biometric Security using Liveness Detection Gurmeet Kaur 1, Parikshit 2, Dr. Chander
More information